General
-
Target
0424d177ffa3a29b1e273a3d64ef4383_JaffaCakes118
-
Size
5.5MB
-
Sample
241001-dllz1axdqj
-
MD5
0424d177ffa3a29b1e273a3d64ef4383
-
SHA1
c6e26363c1d9d8c3d752918ec1a133e36330283c
-
SHA256
8dd0922a775c1fbf612108d54aa45965a480519071ce32891ea7e2ca2ab30097
-
SHA512
fcbdf49fdf44cfe04d3de8c8cd3e4ac5fe0018c828d48ee21c30736830799a836116d8c03cfc9057e4212f78ebe0bd03aa6cedcbc78712c2d78a8c0b85488f60
-
SSDEEP
98304:/hI84+07xZ+MecqRDxXovnfI44OgJBLgw3CW1Wfa7DgQxorhhRYbVo/NZIprR0ok:/ak07PojRDx4vnfI3PJD3Ceb/t2r7Rv7
Static task
static1
Behavioral task
behavioral1
Sample
0424d177ffa3a29b1e273a3d64ef4383_JaffaCakes118.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral2
Sample
0424d177ffa3a29b1e273a3d64ef4383_JaffaCakes118.apk
Resource
android-x64-20240624-en
Malware Config
Targets
-
-
Target
0424d177ffa3a29b1e273a3d64ef4383_JaffaCakes118
-
Size
5.5MB
-
MD5
0424d177ffa3a29b1e273a3d64ef4383
-
SHA1
c6e26363c1d9d8c3d752918ec1a133e36330283c
-
SHA256
8dd0922a775c1fbf612108d54aa45965a480519071ce32891ea7e2ca2ab30097
-
SHA512
fcbdf49fdf44cfe04d3de8c8cd3e4ac5fe0018c828d48ee21c30736830799a836116d8c03cfc9057e4212f78ebe0bd03aa6cedcbc78712c2d78a8c0b85488f60
-
SSDEEP
98304:/hI84+07xZ+MecqRDxXovnfI44OgJBLgw3CW1Wfa7DgQxorhhRYbVo/NZIprR0ok:/ak07PojRDx4vnfI3PJD3Ceb/t2r7Rv7
Score8/10-
Checks if the Android device is rooted.
-
Queries information about running processes on the device
Application may abuse the framework's APIs to collect information about running processes on the device.
-
Queries information about the current nearby Wi-Fi networks
Application may abuse the framework's APIs to collect information about the current nearby Wi-Fi networks.
-
Queries information about active data network
-
Queries information about the current Wi-Fi connection
Application may abuse the framework's APIs to collect information about the current Wi-Fi connection.
-
Queries the unique device ID (IMEI, MEID, IMSI)
-
Reads information about phone network operator.
-
MITRE ATT&CK Mobile v15
Defense Evasion
Download New Code at Runtime
1Execution Guardrails
1Geofencing
1Virtualization/Sandbox Evasion
1System Checks
1